Analysis
-
max time kernel
138s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe
-
Size
382KB
-
MD5
b17abc086c7a06a60b540dc31b08e5c8
-
SHA1
6903e71fd7249176004edccca3f3f5b004261332
-
SHA256
42f9e355dc416d64bfd0ed36c2f11c5a7230d065dbcff37d1001e83a34ce9b64
-
SHA512
3e4472ffa7468e4c1233a0ca7d9380633a8c70b2c43112bfa4a292e7f959c3260300bbfa2b7ca0a689d96a00c13896e7ab02fe1ba76b8306a3b2084f4d7e0f83
-
SSDEEP
6144:gbXE9OiTGfhEClq9aIlue3933tbuR6t4t5queGoc0Rk8yXDZ/2BaTrMO3V:EU9XiuitIlq6Gtgu/B0mjXDMITrMO3V
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 i144.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ololo\3t.jpg b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\ololo\i144.exe b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\ololo\test5.bat b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\ololo\p.txt b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\ololo\3t.jpg svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i144.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1088 regedit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3228 mspaint.exe 3228 mspaint.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3228 mspaint.exe 1176 OpenWith.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3228 2172 b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe 87 PID 2172 wrote to memory of 3228 2172 b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe 87 PID 2172 wrote to memory of 3228 2172 b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe 87 PID 2172 wrote to memory of 1796 2172 b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe 88 PID 2172 wrote to memory of 1796 2172 b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe 88 PID 2172 wrote to memory of 1796 2172 b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe 88 PID 2172 wrote to memory of 2432 2172 b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe 90 PID 2172 wrote to memory of 2432 2172 b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe 90 PID 2172 wrote to memory of 2432 2172 b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe 90 PID 1796 wrote to memory of 1088 1796 cmd.exe 95 PID 1796 wrote to memory of 1088 1796 cmd.exe 95 PID 1796 wrote to memory of 1088 1796 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Program Files (x86)\ololo\3t.jpg" /ForceBootstrapPaint3D2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\ololo\test5.bat" "2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\regedit.exeregedit -s snapshot.reg3⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1088
-
-
-
C:\Program Files (x86)\ololo\i144.exe"C:\Program Files (x86)\ololo\i144.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
PID:4272
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5d8b2648966f588f00e522dd5f638a0da
SHA157a09e39e7a2f6797db478f51c4d32985b0db6f1
SHA25650c7fcbcdf65265ce9128d04770f29cb3458390e313bc6434b4abfba50876a74
SHA5121fa22158c42e6c1caef7994c29097dcf892a966465c58248142c76112bf3b4e55bdd70a2d2600a4a4b34b71d773c40aa62eaa2e3f09e78c6510f9dda659af2a0
-
Filesize
149KB
MD5c9a4571669fc07cb7424dac0f1476c1b
SHA1d468842a1b4cc517213bdc596725b62c076fefbe
SHA25616c5fb03fe264c0096cd6147625c8141540b5974628d71f70e0c9e46670dba3e
SHA51208984a01cfa4a714b401ba98c301eff6839bb0c4bb04c20c56d75058d4e7e5425fc71aabe8e3a0a1c9f411ad8a95b9b40d37ee3407eaebb981bedd350626c4c6
-
Filesize
4B
MD5864b153879fd1b48a69b1696349100df
SHA17c2130011ab48a0997571f4af3c3534159031f04
SHA256d5f0eb6a8671aec1295e01dcbae8b70bbdbece3bf94dac0271185ea19c9e2f78
SHA512b8935dc2945b37a05d7867645c26cfe8c3fe30dd31bab487751f92a97935532913caedab74032e31600b858f20520952e13d9bc6776c9160f9efc077f0085088
-
Filesize
33KB
MD513b1f83b47424e923a88346092c04c08
SHA1f8bfa87b127bfa20a36ecd4d71defc0272bb0698
SHA256a87014b17f6c4289c7ecb163c7e34c147306579810f0e0727e1649337e1085c6
SHA5129c12aa6a28927760bd0fda71a44792bc2ad3149557994b0997dbb4e180328240d9ceba21ffeaa9ca2287a9747dbd75da17a2dbbf01bdfe7ab23ec26c98e6332a